The trusted device network approach provides an organization with a higher level of control over critical system access.
可信任硬件网络策略提供了一种可以更高效控制临界系统接入的组织结构。
Mobile communication devices such as PDA and cellular phone will be inalterable and credible by installing the PTD (Personal Trusted device).
手机等行动装置加装此安全模组晶片将成为可信赖之防窜改装置,即个人信赖装置。
Pushing the device emulation from the hypervisor to user space has some distinct advantages. The most important advantage relates to what's called the trusted computing base (TCB).
将设备模拟从管理程序推向用户空间有一些明显的优势,最大的优势涉及所谓的可信计算基础(trusted computing base, TCB)。
Contains the Trusted Keys for the device.
包含信任的关键设备。
Contains the Trusted Keys for the device.
包含信任的关键设备。
应用推荐